Answer:
c
Explanation:
i feel they should take advantage of theit financial strength
Answer:
Debit Accounts Payable, and Credit Purchase Returns and Allowances
Explanation:
The adjusting entry is shown below:
Account Payable A/c Dr
To Purchase Returns and Allowances
(Being return of goods is recorded)
Since the goods are purchased on credit, and due to some issues the goods are returned So, the account payable account should be debited and the purchase return and allowances should be credited.
Six
sigma is a philosophy and set of methods companies use to eliminate defects in
their products and processes<span>.
It also seeks to reduce variation in the processes that
lead to product defects. It measures quality,
process for Continuous Improvement and enabler for culture
change so culturally six sigma means companies must learn how to be nearly
flawless in executing key processes and achieving business imperatives. Quantitatively six sigma means the average process generates no
more than 3.4 defects per million. Therefore, based on the figures given above
the defects per million opportunities (DPMO) is 15, 333 and the defective rate
us 1.533% and the passed rate is 98.467%.</span>
Outsourcing is so sophisticated that even core functions such as engineering, research and development, manufacturing, information technology, and marketing can be moved outside the firm.
The practice of employing a third party from outside a business to carry out tasks or produce commodities that were previously completed in-house by the business's own employees and personnel is known as outsourcing. Companies typically engage in outsourcing as a cost-cutting strategy.
The outside business, often referred to as the network operator or third-party provider, makes arrangements for its own personnel or technological resources to carry out the duties or offer the services either on-site at the premises of the hiring business or at other places.
To learn more about outsourcing click here:
brainly.com/question/14202035
#SPJ4
Compliance is a feature of secure access.
<h3>What is secure access?</h3>
This is the term that is used in cyber security to mean the bringing together of secure cloud security into the cloud services.
It works by enabling both security and network together as a service that can be rendered via cloud. What this helps to do is to ensure the safety and the security of the services.
Read more on security of computer systems here:
brainly.com/question/25720881
#SPJ1